Adversarial Gaussian Process Regression in Sensor Networks

Cyber‐physical systems are fundamental to operations of many safety critical systems, from power plants to autonomous cars. Such systems feature a control loop that maps sensor measurements to control decisions. In many applications, these decisions involve maintaining system state features, such as temperature and pressure, in a safe range, with anomaly detection employed to ensure that anomalous or malicious sensor measurements do not subvert system operation. Although anomaly detection has been studied in the literature, many existing approaches focus on the cases with passive adversaries. Our first contribution is a novel stealthy attack on systems featuring Gaussian Process regression (GPR) for anomaly detection—a popular choice for this task. Next, we pose the problem of robust GPR for anomaly detection as a Stackelberg game and present a novel algorithmic approach for solving it. Our experimental evaluation demonstrates both the vulnerability of baseline systems to attack, as well as the increased robustness offered by our approach.

[1]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[2]  Yevgeniy Vorobeychik,et al.  Adversarial Regression for Detecting Attacks in Cyber-Physical Systems , 2018, IJCAI.

[3]  Henrik Sandberg,et al.  Limiting the Impact of Stealthy Attacks on Industrial Control Systems , 2016, CCS.

[4]  Kamal Jamshidi,et al.  Anomaly detection and localization in crowded scenes using connected component analysis , 2017, Multimedia Tools and Applications.

[5]  Yevgeniy Vorobeychik,et al.  Resilient observation selection in adversarial settings , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[6]  Carl E. Rasmussen,et al.  Gaussian processes for machine learning , 2005, Adaptive computation and machine learning.

[7]  Chang-Tsun Li,et al.  Video Anomaly Detection With Compact Feature Sets for Online Performance , 2017, IEEE Transactions on Image Processing.

[8]  Andreas Krause,et al.  Near-Optimal Sensor Placements in Gaussian Processes: Theory, Efficient Algorithms and Empirical Studies , 2008, J. Mach. Learn. Res..

[9]  Abhishek Dubey,et al.  Optimal detection of faulty traffic sensors used in route planning , 2017, SCOPE@CPSWeek.

[10]  Mohieddine Jelali,et al.  Revision of the Tennessee Eastman Process Model , 2015 .

[11]  Stephen P. Boyd,et al.  Sensor Selection via Convex Optimization , 2009, IEEE Transactions on Signal Processing.

[12]  H. B. McMahan,et al.  Robust Submodular Observation Selection , 2008 .

[13]  Haris Vikalo,et al.  Greedy sensor selection: Leveraging submodularity , 2010, 49th IEEE Conference on Decision and Control (CDC).

[14]  E. F. Vogel,et al.  A plant-wide industrial process control problem , 1993 .

[15]  Khurum Nazir Junejo,et al.  Behaviour-Based Attack Detection and Classification in Cyber Physical Systems Using Machine Learning , 2016, CPSS@AsiaCCS.

[16]  Paul Honeine,et al.  ${l_p}$-norms in One-Class Classification for Intrusion Detection in SCADA Systems , 2014, IEEE Transactions on Industrial Informatics.

[17]  N. Lawrence Ricker,et al.  Decentralized control of the Tennessee Eastman Challenge Process , 1996 .

[18]  Wen-Hsien Fang,et al.  Gaussian Process Regression-Based Video Anomaly Detection and Localization With Hierarchical Feature Representation , 2015, IEEE Transactions on Image Processing.